- Course introduction
- Welcome
- Course details
- Authentication
- Introduction
- Knowledge check
- Authenticating with a username and passphrase
- Using multi-factor authentication
- Never share your personal IU credentials
- Login only at legitimate IU services
- Quiz
- Wrapping up
- Phishing
- Introduction
- Knowledge check
- What is phishing?
- Recognize
- Rethink
- Report
- Quiz
- Wrapping up
- Passphrase and secret management
- Introduction
- Knowledge check
- What is a secret, password, and passphrase?
- IU password complexity requirements
- Best practices for securing secrets and passphrases
- Common shared access situations at IU
- Quiz
- Wrapping up
Course progress
- Network security
- Introduction
- Knowledge check
- Using IU's network
- Working remotely for IU
- Quiz
- Wrapping up
- Data storage and use
- Introduction
- Knowledge check
- IU data classifications
- Data storage at IU
- Data access considerations
- Quiz
- Wrapping up
- Incident reporting and recovery
- Introduction
- Knowledge check
- Reporting a suspected IT incident
- Reporting lost devices or data
- University security policy resources
- Quiz
- Wrapping up
- Wrapping up
- End of course